#
ff6601a6 |
| 03-Jun-2023 |
lukem <lukem@NetBSD.org> |
bsd.own.mk: rename GCC_NO_* to CC_WNO_*
Rename compiler-warning-disable variables from GCC_NO_warning to CC_WNO_warning where warning is the full warning name as used by the compiler.
GCC_NO_IMPL
bsd.own.mk: rename GCC_NO_* to CC_WNO_*
Rename compiler-warning-disable variables from GCC_NO_warning to CC_WNO_warning where warning is the full warning name as used by the compiler.
GCC_NO_IMPLICIT_FALLTHRU is CC_WNO_IMPLICIT_FALLTHROUGH
Using the convention CC_compilerflag, where compilerflag is based on the full compiler flag name.
show more ...
|
#
8c9f2f03 |
| 07-Mar-2021 |
christos <christos@NetBSD.org> |
- Enable WARMSTART - Pass fd to libwrap - Add blocklist From Greg A. Woods
- Tidy up debugging
|
#
4faa74e8 |
| 13-Oct-2019 |
mrg <mrg@NetBSD.org> |
introduce some common variables for use in GCC warning disables:
GCC_NO_FORMAT_TRUNCATION -Wno-format-truncation (GCC 7/8) GCC_NO_STRINGOP_TRUNCATION -Wno-stringop-truncation (GCC 8) GCC_NO_STRI
introduce some common variables for use in GCC warning disables:
GCC_NO_FORMAT_TRUNCATION -Wno-format-truncation (GCC 7/8) GCC_NO_STRINGOP_TRUNCATION -Wno-stringop-truncation (GCC 8) GCC_NO_STRINGOP_OVERFLOW -Wno-stringop-overflow (GCC 8) GCC_NO_CAST_FUNCTION_TYPE -Wno-cast-function-type (GCC 8)
use these to turn off warnings for most GCC-8 complaints. many of these are false positives, most of the real bugs are already commited, or are yet to come.
we plan to introduce versions of (some?) of these that use the "-Wno-error=" form, which still displays the warnings but does not make it an error, and all of the above will be re-considered as either being "fix me" (warning still displayed) or "warning is wrong."
show more ...
|
#
2bdb98a4 |
| 24-Apr-2019 |
roy <roy@NetBSD.org> |
Fix building rpcbind with MKYP=no
We add enough of the YP headers to security.c so the security checks can remain as is.
|
#
a82ce562 |
| 17-Aug-2017 |
ginsbach <ginsbach@NetBSD.org> |
Revert accidently committed enabling WARMSTART.
|
#
b025c739 |
| 16-Aug-2017 |
ginsbach <ginsbach@NetBSD.org> |
Write the "warm start" file to /var/run rather than /tmp. (Restore changes clobbered by merge of FreeBSD changes. Hi christos!)
|
#
d877c4c3 |
| 22-Apr-2009 |
lukem <lukem@NetBSD.org> |
Enable WARNS=4 by default, except for: cpuctl dumplfs hprop ipf iprop-log kadmin kcm kdc kdigest kimpersonate kstash ktutil makefs ndbootd ntp pppd quot racoon racoonctl rtadvd s
Enable WARNS=4 by default, except for: cpuctl dumplfs hprop ipf iprop-log kadmin kcm kdc kdigest kimpersonate kstash ktutil makefs ndbootd ntp pppd quot racoon racoonctl rtadvd sntp sup tcpdchk tcpdmatch tcpdump traceroute traceroute6 user veriexecgen wsmoused zic (Mostly third-party applications)
show more ...
|
#
b504fee4 |
| 27-Aug-2007 |
dsl <dsl@NetBSD.org> |
Depracate ND_DEBUG and BIND_DEBUG in favour of RPCBIND_DEBUG. Add commented out entries for RPCBIND_DEBUG and SVC_RUN_DEBUG in Makefile.
|
#
36a21907 |
| 28-May-2007 |
tls <tls@NetBSD.org> |
Since Christos cleaned up the use of libc internals here, we can switch these from USE_SSP to USE_FORT as they should be.
|
#
59984018 |
| 28-May-2007 |
christos <christos@NetBSD.org> |
get rid of libc cruft. requested by tls
|
#
4147a3c5 |
| 28-May-2007 |
tls <tls@NetBSD.org> |
Add new Makefile knob, USE_FORT, which extends USE_SSP by turning on the FORTIFY_SOURCE feature of libssp, thus checking the size of arguments to various string and memory copy and set functions (as
Add new Makefile knob, USE_FORT, which extends USE_SSP by turning on the FORTIFY_SOURCE feature of libssp, thus checking the size of arguments to various string and memory copy and set functions (as well as a few system calls and other miscellany) where known at function entry. RedHat has evidently built all "core system packages" with this option for some time.
This option should be used at the top of Makefiles (or Makefile.inc where this is used for subdirectories) but after any setting of LIB.
This is only useful for userland code, and cannot be used in libc or in any code which includes the libc internals, because it overrides certain libc functions with macros. Some effort has been made to make USE_FORT=yes work correctly for a full-system build by having the bsd.sys.mk logic disable the feature where it should not be used (libc, libssp iteself, the kernel) but no attempt has been made to build the entire system with USE_FORT and doing so will doubtless expose numerous bugs and misfeatures.
Adjust the system build so that all programs and libraries that are setuid, directly handle network data (including serial comm data), perform authentication, or appear likely to have (or have a history of having) data-driven bugs (e.g. file(1)) are built with USE_FORT=yes by default, with the exception of libc, which cannot use USE_FORT and thus uses only USE_SSP by default. Tested on i386 with no ill results; USE_FORT=no per-directory or in a system build will disable if desired.
show more ...
|
#
de327a01 |
| 13-May-2007 |
christos <christos@NetBSD.org> |
- WARNS = 4 - De __P - While starting up, send messages to stderr not syslog. - Fix error messages - Don't play with umask and forget to restore it on error
|
#
71570115 |
| 10-Jan-2005 |
lukem <lukem@NetBSD.org> |
Only compile in IPv6 support if ${USE_INET6} != "no"
MKINET6 is for providing IPv6 infrastructure. USE_INET6 is for compiling IPv6 support into the programs (needs MKINET6).
|
#
3c12447a |
| 07-Dec-2003 |
matt <matt@NetBSD.org> |
Make building IPv6 support controllable by MKINET6
|
#
17d72c8a |
| 18-Sep-2002 |
lukem <lukem@NetBSD.org> |
use NETBSDSRCDIR as appropriate
|
#
ce3461b3 |
| 20-Jun-2000 |
fvdl <fvdl@NetBSD.org> |
Oops, previous should not have been committed.
|
#
6806083e |
| 20-Jun-2000 |
fvdl <fvdl@NetBSD.org> |
Free buffer used in xdrmem_create.
|
#
d687de29 |
| 02-Jun-2000 |
fvdl <fvdl@NetBSD.org> |
rpcbind, the successor to portmap. Taken from Sun TI-RPC source code, then modified. This still contains some ugly special casing for procedures in the security section, but I haven't found a nicer w
rpcbind, the successor to portmap. Taken from Sun TI-RPC source code, then modified. This still contains some ugly special casing for procedures in the security section, but I haven't found a nicer way so far.
show more ...
|